Sciweavers

2994 search results - page 390 / 599
» Time sequences
Sort
View
120
Voted
CVPR
2007
IEEE
16 years 5 months ago
Real-time Automatic Deceit Detection from Involuntary Facial Expressions
Being the most broadly used tool for deceit measurement, the polygraph is a limited method as it suffers from human operator subjectivity and the fact that target subjects are awa...
Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey ...
161
Voted
INFOCOM
1999
IEEE
15 years 8 months ago
Hop Reservation Multiple Access (HRMA) for Ad-Hoc Networks
A new multichannel MAC protocol called Hop-Reservation Multiple Access (HRMA) for wireless ad-hoc networks (multi-hop packet radio networks) is introduced, specified and analyzed. ...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
138
Voted
JCB
2008
111views more  JCB 2008»
15 years 3 months ago
Sorting Genomes with Centromeres by Translocations
A centromere is a special region in the chromosome that plays a vital role during cell division. Every new chromosome created by a genome rearrangement event must have a centromer...
Michal Ozery-Flato, Ron Shamir
137
Voted
ICRA
2009
IEEE
132views Robotics» more  ICRA 2009»
15 years 10 months ago
Smoothed Sarsa: Reinforcement learning for robot delivery tasks
— Our goal in this work is to make high level decisions for mobile robots. In particular, given a queue of prioritized object delivery tasks, we wish to find a sequence of actio...
Deepak Ramachandran, Rakesh Gupta
ICDCS
2006
IEEE
15 years 9 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...